Search: European Union,Cybersecurity (6 materials)

Business and the State: Together into the Brave “Cyber World”?

... easier to do business. Third, if single standards and rules are developed, those companies that fail to comply may be held accountable. This is an excellent way to consolidate one’s market standing and undermine competitors. Steve Crown: Microsoft Cybersecurity Initiatives Finally, by calling for government regulations, companies will be able not merely to join the process of drafting rules that suit them, but to take the lead in this, especially since they have the groundwork already laid out....

18.05.2020

Protecting Personal Data: Who Is the Governor?

... project, while partly supporting the idea. Third, suspicious international reactions are detrimental to the country’s image. Pavel Sharikov: Protecting Sensitive Data: The Experience of Russia and the US 3. Juggling various interests Following the Cybersecurity law of 2017, China introduced the non-binding national standard Personal Information Security Specification that is somewhat similar to GDPR. The main focus of the document, however, lies in ensuring national security while still making ...

11.06.2019

RIAC at Cyber Forum in Garmisch-Partenkirchen

On April 22–25, 2019, the 13th International Forum on the Problems of International Information Security was held in Garmisch-Partenkirchen (Germany). On April 22–25, 2019, the 13th International Forum on the Problems of International Information Security was held in Garmisch-Partenkirchen (Germany). The forum was organized by the National Association for International Information Security (NAIIS) with the International Affairs Journal and gathered over 100 experts from 18 countries (the USA, the...

27.04.2019

Mean Girls and Cybersecurity

... country’s officials refrain from speaking openly on the subject. However, on the doctrinal level, the wording tends to be either based on strict principle or very careful. The clearest example of this is a lengthy discussion on information security vs. cybersecurity and the differences in approaches. What’s more, when looking at various public statements on a subject, one should draw a clear distinction between those made by politicians and those made by technical experts and diplomats at international ...

27.07.2018

Russia’s New Foreign Policy Cycle

Foreign viewpoints After the reelection of Vladimir Putin for another term as president of the Russian Federation in March of this year, Russia is entering a new cycle of foreign and domestic policy. Russia's foreign policy at the moment is particularly fraught; the conflict in Syria, the continued uncertain status of the Donbass region of Ukraine, accusations of cyberwarfare and interference in US elections, and the Skripal poisoning incident in the UK have driven wedges between Russia and many...

07.05.2018

NATO’s Cyber Defense Evolution

... agreement was signed between the NATO Computer Incident Response Capability (NCIRC) and the Computer Emergency Response Team of the European Union (CERT-EU). The agreement provides for exchanging technical information between these two bodies, which is intended ... ... virtually any country can become a superpower in cyberspace. REUTERS/Christian Hartmann Dmitry Konukhov: Vaccinated Atom: Cybersecurity for Nuclear Plants NATO’s current policies in cyberspace are based on defence and deterrence. The Alliance’s ...

13.09.2016

Poll conducted

  1. In your opinion, what are the US long-term goals for Russia?
    U.S. wants to establish partnership relations with Russia on condition that it meets the U.S. requirements  
     33 (31%)
    U.S. wants to deter Russia’s military and political activity  
     30 (28%)
    U.S. wants to dissolve Russia  
     24 (22%)
    U.S. wants to establish alliance relations with Russia under the US conditions to rival China  
     21 (19%)
 
For business
For researchers
For students